The Desktop Sharing Handbook. Brad Hards



Similar documents
The Remote Desktop Connection Handbook. Brad Hards Urs Wolfer

Check current version of Remote Desktop Connection for Mac.. Page 2. Remove Old Version Remote Desktop Connection..Page 8

Vine Server. v3.1. Manual

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

Setting up VPN and Remote Desktop for Home Use

Setting up VPN and Remote Desktop for Home Use

License Patrol TM Mac Client Installation Guide 7.0 for Mac OS X. September 2015 VERALAB TM

Interacting with Users

Remote Desktop In OpenSUSE 10.3

Outlook basics. Identify user interface elements that you can use to accomplish basic tasks.

Here is a demonstration of the Aqua Accelerated Protocol (AAP) software see the Aqua Connect YouTube Channel

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Hallpass Instructions for Connecting to Mac with a Mac

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Connecting to Remote Desktop Windows Users

RDM+ Desktop for Windows Getting Started Guide

Kaseya 2. User Guide. for VSA 6.3

eduroam Network guide configuration for Microsoft Windows 7

Office 365 Mail: Mac Mail OS X

How to Setup OSX Mail to POP an Exchange Account

Installing the SSH Client v3.2.2 For Microsoft Windows

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Versions Addressed: Microsoft Office Outlook 2010/2013. Document Updated: Copyright 2014 Smarsh, Inc. All right reserved

Immotec Systems, Inc. SQL Server 2005 Installation Document

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

Aspera Connect User Guide

WORKING WITH WINDOWS FIREWALL IN WINDOWS 7

M2Web - Browser-Based Mobile Remote Access

Webmail. Setting up your account

Apple Mail Setup Guide (POP3)

Remote Access for Cisco Unity 8.x

Windows Live Mail Setup Guide

Introduction to TightVNC. Installation. TightVNC for Windows: Installation and Getting Started. TightVNC Version 2.6 Copyright 2012 GlavSoft LLC.

ipad Installation and Setup

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1

ShadowControl ShadowStream

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

First Time On-Campus Remote Desktop Connection ipad Edition

Using Virtual Machines

Connecting to Pitt s SRemote VPN Using Windows Vista / Windows 7 January 2012

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

ing from The E2 Shop System address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

13.1 Backup virtual machines running on VMware ESXi / ESX Server

Configuration Guide. Follow the simple steps given in this document when you are going to run Lepide Active Directory Cleaner for the first time.

MAC OS X 10.5 Mail Setup

INTRODUCTION... 2 Windows Windows Mac OS X Ubuntu Advanced routing Windows Mac OS X Ubuntu...

Getting started with IMAP for Aggi What is IMAP?

Daylite Server Admin Guide (Dec 09, 2011)

2. The application will appear in the Applications folder. Once installed, launch Microsoft Remote Desktop from the Applications folder on your Mac.

How Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1

Instructions for Microsoft Outlook 2003

NAS 225 Introduction to FTP Explorer

Back to My Mac User s Guide

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class

VidyoDesktop VE. Quick User Guide. Product Version 3.0 Document Version A July, 2014

User guide. Business

Setting up Citrix XenServer for 2X VirtualDesktopServer Manual

Initial Setup. How To Run A Mac Server:

ReadyNAS Remote. User Manual. June East Plumeria Drive San Jose, CA USA

Basic Exchange Setup Guide

Remote Access and Control of the. Programmer/Controller. Version 1.0 9/07/05

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop

XenApp/Citrix Program Neighborhood Installation

CTERA Agent for Mac OS-X

1. Open the Account Settings window by clicking on Account Settings from the Entourage menu.

Visualization Cluster Getting Started

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

Installation Guide for Microsoft SQL Server 2008 R2 Express. October 2011 (GUIDE 1)

MessageGuard 3.0 User Guide

Terminal Server Guide

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E

WINDOWS 7 & HOMEGROUP

QUANTIFY INSTALLATION GUIDE

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

You may have been given a download link on your trial software . Use this link to download the software.

Global Knowledge MEA Remote Labs. Remote Lab Access Procedure

How To Install Sedar On A Workstation

Quick Installation Guide for BrainTrading System 7.0

UCO_SECURE Wireless Connection Guide: Windows 8

Quick Connect. Overview. Client Instructions. LabTech

Bloomfield Hills Schools VPN and Viewconnect Instructions

SonicWALL SSL VPN 3.5: Virtual Assist

XCM Internet Explorer Settings

smarshencrypt User s Guide

Using Remote Desktop with No-IP

Using SQL-server as database engine

Advanced Event Viewer Manual

Remote Assistance using Juniper Networks Secure Meeting

StarWind iscsi SAN Software: Using StarWind with VMware ESX Server

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

Configuring Your Client: Eudora 5.x

Install and configure SSH server

Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server

How To Use The Macintosh Pcounter On Pc Or Macintosh (For Pc) With A Pc Or Pc (For Mac) With An External Hard Drive With A Printer On Itunes) With The Powerpoint (For Windows) On A Pc

Imaging License Server User Guide

How to make a VPN connection to our servers from Windows 8

Basic Exchange Setup Guide

Transcription:

Brad Hards

2

Contents 1 Introduction 5 2 The Remote Frame Buffer protocol 6 3 Using Desktop Sharing 7 3.1 Managing Desktop Sharing invitations.......................... 9 3.2 Quit Desktop Sharing.................................... 9 3.3 Configuring Desktop Sharing............................... 9 3.4 What happens when someone connects to Desktop Sharing.............. 10 4 Credits and License 12 A Installation 13 A.1 How to obtain Desktop Sharing.............................. 13 A.2 Compilation and Installation............................... 13

Abstract Desktop Sharing is a server application that allows you to share your current session with a user on another machine, who can use a VNC client to view or even control the desktop.

Chapter 1 Introduction Desktop Sharing is a server application that allows you to share your current session with a user on another machine, who can use a VNC client to view or even control the desktop. You would typically use Desktop Sharing with the KDE VNC client, which is Remote Desktop Connection, since it closely matches the special features of Desktop Sharing. Desktop Sharing doesn t require you to start a new X session - it can share the current session. This makes it very useful when you want someone to help you perform a task. Please report any problems or feature requests to the KDE mailing lists or file a bug at http://bugs.kde.org. 5

Chapter 2 The Remote Frame Buffer protocol This chapter provides a brief description of the Remote Frame Buffer protocol used by Desktop Sharing and by other compatible systems. If you are already familiar with Remote Frame Buffer, you can safely skip this chapter. The high level implementation of a system using the Remote Frame Buffer protocol is known as Virtual Network Computer, or more often just as VNC. Remote Frame Buffer (or RFB for short) is a simple protocol for remote access to graphical user interfaces. It works at the frame-buffer level, which roughly corresponds to the rendered screen image, which means that it can be applied to all windowing systems (including X11, Mac OS and Microsoft Windows ). Remote Frame Buffer applications exist for many platforms, and can often be freely re-distributed. In the Remote Frame Buffer protocol, the application that runs on the machine where the user sits (containing the display, keyboard and pointer) is called the client. The application that runs on the machine where the framebuffer is located (which is running the windowing system and applications that the user is remotely controlling) is called the server. Desktop Sharing is the KDE server for the Remote Frame Buffer protocol. Remote Desktop Connection is the KDE client for the Remote Frame Buffer protocol. It takes a reasonable amount of network traffic to send an image of the framebuffer, so Remote Frame Buffer works best over high bandwidth links, such as a local area network. It is still possible to use Desktop Sharing over other links, but performance is unlikely to be as good. 6

Chapter 3 Using Desktop Sharing It is very easy to use Desktop Sharing - it has a simple interface, as shown in the screenshot below. When you want to allow someone to access your desktop, you can create an personal invitation using the New Personal Invitation... button, which will bring up a window containing the information needed to access your desktop. An example is shown below. 7

To increase security, the invitation is only valid for an hour after it is created, and of course the person connecting has to have the correct password. Since you may want to invite someone to access your desktop by email, Desktop Sharing can create invitations as email messages. You can create such an invitation using the New Email Invitation... button on the Desktop Sharing main window. This will usually bring up an email message that looks like the following, ready for you to type in the email address of the person you are sending the invitation to. 8

WARNING Desktop Sharing will warn you about the security implications of sending this information across an insecure link. You must heed those warnings. If you cannot encrypt the email (or otherwise secure the link), sending invitations by email is a very serious security risk, since anyone can read the password and address from the email as it passes over the network. This means that they can potentially take control of your machine. If you cannot encrypt the email message, it may be better to use a personal invitation, telephone the person you are giving access to, verify the identity of that person, and provide the required invitation information that way. 3.1 Managing Desktop Sharing invitations Having created an invitation (either a personal invitation or one that was sent by email), Desktop Sharing main window allows you to delete existing invitations. To just delete one of the invitations, select it with the mouse (it should become highlighted), and then select the Delete. To delete all invitations, just select the Delete All button. 3.2 Quit Desktop Sharing If you close the Desktop Sharing main window the server keeps running, which is indicated by an icon in the system tray. To stop Desktop Sharing right click on the icon in the systems tray and select Quit. 3.3 Configuring Desktop Sharing In addition to the main Desktop Sharing interface shown and described above, you can also control Desktop Sharing using the Configure... on the Desktop Sharing main window. The Desktop Sharing configuration has two pages, as shown in the screenshot below: The Network page allows control over the port that Desktop Sharing uses, as shown below. 9

The Announce service on the network checkbox controls whether Desktop Sharing announces invitations over the network using Service Location Protocol. This is normally a good idea, but only works really well with a Service Location Protocol aware client, such as Remote Desktop Connection. If you select the Use default port checkbox, then Desktop Sharing will locate a suitable port, and invitations will match this port. If you deselect this checkbox, you can specify a particular port. Specifying a particular port may be useful if you are using port-forwarding on the firewall. Note that if Service Location Protocol is turned on, this will automatically deal with identifying the correct port. The Security page allows you configure settings related to access to the Desktop Sharing server. The Allow uninvited connections check box controls whether Desktop Sharing allows connection without an invitation. If uninvited connections are allowed, then you should probably specify a password. You can also use the check boxes here to choose whether you have to confirm the connection before it proceeds, and whether the person connecting can control the desktop, or only view. If the machine is a workstation, and you choose to allow uninvited connections, you probably want to select the Ask before accepting connections. Conversely, if the machine is a server and you are using Desktop Sharing for remote administration, you probably want to deselect this option. NOTE Desktop Sharing uses the normal RFB password system, which does not transfer your password in the clear across the network. Instead, it uses a challenge-response system. This is reasonably secure, as long as the password is securely guarded. 3.4 What happens when someone connects to Desktop Sharing When someone connects to Desktop Sharing on your machine, you will get a pop-up notification that looks like the following screenshot, unless you are accepting uninvited connections without warning. 10

If you Accept Connection, the client can proceed to authenticate (which requires the correct password for a personal invitation or email invitation). If you Refuse Connection, then the attempt to connect will be terminated. The Allow remote user to control keyboard and mouse check box determines whether this client can only observe, or can take control of your machine. If the client connection is successful, and used the password from a personal invitation or email invitation, then that invitation is deleted and cannot be used again. You will also get a small pop-up window in the dock, that shows that the connection has been made. 11

Chapter 4 Credits and License Desktop Sharing Program copyright 2002 Tim Jansen tim@tjansen.de Contributors: Ian Reinhart Geiser geiseri@kde.org Documentation Copyright (c) 2003 Brad Hards bradh@frogmouth.net This documentation is licensed under the terms of the GNU Free Documentation License. This program is licensed under the terms of the GNU General Public License. 12

Appendix A Installation A.1 How to obtain Desktop Sharing Desktop Sharing is part of the KDE project http://www.kde.org/. Desktop Sharing can be found on the download site of the KDE project. A.2 Compilation and Installation For detailed information on how to compile and install KDE applications see Building and Running KDE Software From Source Since KDE uses cmake you should have no trouble compiling it. Should you run into problems please report them to the KDE mailing lists. 13